Deploying intrusion detection (IDS) policies